Scrutinizer is an enterprise/business class NetFlow and sFlow analysis tool. Scrutinizer provides historical trends of the company's critical network interfaces as well as the details on:

Who: The end system causing the traffic
What: The application/protocol that is being used
When: The time frame it has been occurring for
Where: The network connection that is affected

Moderators: scottr, Moderator Team

Post Reply
Posts: 1
Joined: Thu Jan 08, 2015 2:17 pm


Post by AshlandSG » Thu Jan 08, 2015 2:35 pm

I searched for HOPOPT here and only one post showed up with no explanation nor solution.

I have so much traffic for HOPOPT 0 going from :: to :: and is ranked #1 on my list at is over 200 Mb/s. But, no explanation for what it is, no real source nor destination. How am I suppose to interpret this? Is there a patch to help analyze those type of packet?

Using Scrutinizer

John Babbitt
Systems Administrator
Ashland Support Group

Posts: 25
Joined: Mon Aug 04, 2014 10:47 am


Post by ryans » Thu Jan 08, 2015 2:56 pm

Hello AshlandSG,

HOPOPT= "The Hop-by-Hop Options header is used to carry optional information that must be examined by every node along a packet's delivery path." It seems like this is a large amount of odd traffic going from localhost to localhost and i believe that your best option is to take a packet capture to see what type of traffic it really is.


Thank you,

Post Reply

Who is online

Users browsing this forum: No registered users and 2 guests